starting build "99457cef-5c00-4854-9c89-4f15867b94cb" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: dd0bbb17640b: Pulling fs layer Step #1: 62275a527176: Pulling fs layer Step #1: 111633040162: Pulling fs layer Step #1: 5bf7dd58428c: Pulling fs layer Step #1: 632c9b314f45: Pulling fs layer Step #1: 8ae501891266: Pulling fs layer Step #1: 3058f8e90c86: Pulling fs layer Step #1: c377fa4fb781: Pulling fs layer Step #1: 2336eb300fb9: Pulling fs layer Step #1: 09429854c898: Pulling fs layer Step #1: 71af8faf61ed: Pulling fs layer Step #1: 687fd097ee80: Pulling fs layer Step #1: 7f1e63401161: Pulling fs layer Step #1: cf8b5802c762: Pulling fs layer Step #1: 5bf7dd58428c: Waiting Step #1: 0e6dab0925eb: Pulling fs layer Step #1: f4bced45a7b2: Pulling fs layer Step #1: 2707ad88823d: Pulling fs layer Step #1: 632c9b314f45: Waiting Step #1: af6705528e9c: Pulling fs layer Step #1: 4e1005e0a6aa: Pulling fs layer Step #1: 118105242bd8: Pulling fs layer Step #1: 2aa39f787b87: Pulling fs layer Step #1: d3f87be3762e: Pulling fs layer Step #1: 6fd806021fc2: Pulling fs layer Step #1: 9d856dc172cd: Pulling fs layer Step #1: 09429854c898: Waiting Step #1: 71af8faf61ed: Waiting Step #1: a987fc666fa1: Pulling fs layer Step #1: c377fa4fb781: Waiting Step #1: 233e05621483: Pulling fs layer Step #1: 8ae501891266: Waiting Step #1: 687fd097ee80: Waiting Step #1: 2336eb300fb9: Waiting Step #1: 0d3facbb2d8c: Pulling fs layer Step #1: 3058f8e90c86: Waiting Step #1: aa9066b95eb6: Pulling fs layer Step #1: ff11ed875e6f: Pulling fs layer Step #1: 118105242bd8: Waiting Step #1: 33f6a6d38c7e: Pulling fs layer Step #1: f4bced45a7b2: Waiting Step #1: 2707ad88823d: Waiting Step #1: 9d856dc172cd: Waiting Step #1: af6705528e9c: Waiting Step #1: 2aa39f787b87: Waiting Step #1: 4e1005e0a6aa: Waiting Step #1: 5ecd2cf410de: Pulling fs layer Step #1: a987fc666fa1: Waiting Step #1: d3f87be3762e: Waiting Step #1: 702a45c3ae33: Pulling fs layer Step #1: 6fd806021fc2: Waiting Step #1: 111633040162: Waiting Step #1: 7f1e63401161: Waiting Step #1: cf8b5802c762: Waiting Step #1: df6fed191aed: Pulling fs layer Step #1: e322f8b94d88: Pulling fs layer Step #1: ff11ed875e6f: Waiting Step #1: e322f8b94d88: Waiting Step #1: 0e6dab0925eb: Waiting Step #1: 0d3facbb2d8c: Waiting Step #1: 702a45c3ae33: Waiting Step #1: 5ecd2cf410de: Waiting Step #1: 33f6a6d38c7e: Waiting Step #1: df6fed191aed: Waiting Step #1: 233e05621483: Waiting Step #1: 62275a527176: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 5bf7dd58428c: Download complete Step #1: 111633040162: Verifying Checksum Step #1: 111633040162: Download complete Step #1: 632c9b314f45: Verifying Checksum Step #1: 632c9b314f45: Download complete Step #1: dd0bbb17640b: Verifying Checksum Step #1: dd0bbb17640b: Download complete Step #1: 3058f8e90c86: Verifying Checksum Step #1: 3058f8e90c86: Download complete Step #1: c377fa4fb781: Verifying Checksum Step #1: c377fa4fb781: Download complete Step #1: b549f31133a9: Pull complete Step #1: 09429854c898: Verifying Checksum Step #1: 09429854c898: Download complete Step #1: 71af8faf61ed: Verifying Checksum Step #1: 71af8faf61ed: Download complete Step #1: 687fd097ee80: Verifying Checksum Step #1: 687fd097ee80: Download complete Step #1: 7f1e63401161: Verifying Checksum Step #1: 7f1e63401161: Download complete Step #1: cf8b5802c762: Verifying Checksum Step #1: cf8b5802c762: Download complete Step #1: 0e6dab0925eb: Verifying Checksum Step #1: 0e6dab0925eb: Download complete Step #1: 2336eb300fb9: Verifying Checksum Step #1: 2336eb300fb9: Download complete Step #1: f4bced45a7b2: Verifying Checksum Step #1: f4bced45a7b2: Download complete Step #1: 2707ad88823d: Verifying Checksum Step #1: 2707ad88823d: Download complete Step #1: af6705528e9c: Download complete Step #1: 4e1005e0a6aa: Verifying Checksum Step #1: 4e1005e0a6aa: Download complete Step #1: 118105242bd8: Verifying Checksum Step #1: 118105242bd8: Download complete Step #1: 2aa39f787b87: Verifying Checksum Step #1: 2aa39f787b87: Download complete Step #1: 6fd806021fc2: Verifying Checksum Step #1: 6fd806021fc2: Download complete Step #1: d3f87be3762e: Verifying Checksum Step #1: d3f87be3762e: Download complete Step #1: 8ae501891266: Verifying Checksum Step #1: 8ae501891266: Download complete Step #1: 9d856dc172cd: Download complete Step #1: 233e05621483: Verifying Checksum Step #1: 233e05621483: Download complete Step #1: a987fc666fa1: Verifying Checksum Step #1: a987fc666fa1: Download complete Step #1: 0d3facbb2d8c: Verifying Checksum Step #1: 0d3facbb2d8c: Download complete Step #1: aa9066b95eb6: Verifying Checksum Step #1: aa9066b95eb6: Download complete Step #1: ff11ed875e6f: Verifying Checksum Step #1: ff11ed875e6f: Download complete Step #1: 33f6a6d38c7e: Verifying Checksum Step #1: 33f6a6d38c7e: Download complete Step #1: 5ecd2cf410de: Download complete Step #1: 702a45c3ae33: Verifying Checksum Step #1: 702a45c3ae33: Download complete Step #1: df6fed191aed: Verifying Checksum Step #1: df6fed191aed: Download complete Step #1: dd0bbb17640b: Pull complete Step #1: 62275a527176: Pull complete Step #1: 111633040162: Pull complete Step #1: 5bf7dd58428c: Pull complete Step #1: 632c9b314f45: Pull complete Step #1: e322f8b94d88: Verifying Checksum Step #1: e322f8b94d88: Download complete Step #1: 8ae501891266: Pull complete Step #1: 3058f8e90c86: Pull complete Step #1: c377fa4fb781: Pull complete Step #1: 2336eb300fb9: Pull complete Step #1: 09429854c898: Pull complete Step #1: 71af8faf61ed: Pull complete Step #1: 687fd097ee80: Pull complete Step #1: 7f1e63401161: Pull complete Step #1: cf8b5802c762: Pull complete Step #1: 0e6dab0925eb: Pull complete Step #1: f4bced45a7b2: Pull complete Step #1: 2707ad88823d: Pull complete Step #1: af6705528e9c: Pull complete Step #1: 4e1005e0a6aa: Pull complete Step #1: 118105242bd8: Pull complete Step #1: 2aa39f787b87: Pull complete Step #1: d3f87be3762e: Pull complete Step #1: 6fd806021fc2: Pull complete Step #1: 9d856dc172cd: Pull complete Step #1: a987fc666fa1: Pull complete Step #1: 233e05621483: Pull complete Step #1: 0d3facbb2d8c: Pull complete Step #1: aa9066b95eb6: Pull complete Step #1: ff11ed875e6f: Pull complete Step #1: 33f6a6d38c7e: Pull complete Step #1: 5ecd2cf410de: Pull complete Step #1: 702a45c3ae33: Pull complete Step #1: df6fed191aed: Pull complete Step #1: e322f8b94d88: Pull complete Step #1: Digest: sha256:defc8ca827fb14827b3bc0d63ae100bbab10dbd76ba16fbf1cdf373c9fb55216 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> c9a62ad2ae6b Step #1: Step 2/5 : RUN apt-get update && apt-get install -y make autoconf automake libtool Step #1: ---> Running in adb91774fe59 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 2s (245 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev file libltdl-dev libltdl7 libmagic-mgc libmagic1 libsigsegv2 Step #1: m4 Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran Step #1: | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev file libltdl-dev libltdl7 libmagic-mgc Step #1: libmagic1 libsigsegv2 libtool m4 Step #1: 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 1774 kB of archives. Step #1: After this operation, 12.8 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 1774 kB in 13s (132 kB/s) Step #1: Selecting previously unselected package libmagic-mgc. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../03-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../04-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../05-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../06-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../07-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../08-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../09-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../10-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container adb91774fe59 Step #1: ---> 7c67b08ef2b2 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/Frommi/miniz_oxide miniz_oxide Step #1: ---> Running in 374fd5140fdc Step #1: Cloning into 'miniz_oxide'... Step #1: Removing intermediate container 374fd5140fdc Step #1: ---> 23de3a109022 Step #1: Step 4/5 : WORKDIR miniz_oxide Step #1: ---> Running in 46c2fa47a30d Step #1: Removing intermediate container 46c2fa47a30d Step #1: ---> 641849cea649 Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> 4a3721d01d23 Step #1: Successfully built 4a3721d01d23 Step #1: Successfully tagged gcr.io/oss-fuzz/miniz_oxide:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/miniz_oxide Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file997IZP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/miniz_oxide/.git Step #2 - "srcmap": + GIT_DIR=/src/miniz_oxide Step #2 - "srcmap": + cd /src/miniz_oxide Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/Frommi/miniz_oxide Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=aa8524b5676852a4fd63c3507429ae2c44eb6a06 Step #2 - "srcmap": + jq_inplace /tmp/file997IZP '."/src/miniz_oxide" = { type: "git", url: "https://github.com/Frommi/miniz_oxide", rev: "aa8524b5676852a4fd63c3507429ae2c44eb6a06" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file6j9V7c Step #2 - "srcmap": + cat /tmp/file997IZP Step #2 - "srcmap": + jq '."/src/miniz_oxide" = { type: "git", url: "https://github.com/Frommi/miniz_oxide", rev: "aa8524b5676852a4fd63c3507429ae2c44eb6a06" }' Step #2 - "srcmap": + mv /tmp/file6j9V7c /tmp/file997IZP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file997IZP Step #2 - "srcmap": + rm /tmp/file997IZP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/miniz_oxide": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/Frommi/miniz_oxide", Step #2 - "srcmap": "rev": "aa8524b5676852a4fd63c3507429ae2c44eb6a06" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + ./build_orig_miniz.sh Step #3 - "compile-libfuzzer-address-x86_64": rm: cannot remove 'bin/libminiz.a': No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": miniz/miniz.c:3089:9: note: #pragma message: Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files. Step #3 - "compile-libfuzzer-address-x86_64": 3089 | #pragma message("Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files.") Step #3 - "compile-libfuzzer-address-x86_64": | ^~~~~~~ Step #3 - "compile-libfuzzer-address-x86_64": miniz_stub/miniz_zip.c:133:9: note: #pragma message: Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files. Step #3 - "compile-libfuzzer-address-x86_64": 133 | #pragma message("Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files.") Step #3 - "compile-libfuzzer-address-x86_64": | ^~~~~~~ Step #3 - "compile-libfuzzer-address-x86_64": + RUSTFLAGS='--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers -L./bin/' Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64": warning: /src/miniz_oxide/fuzz/Cargo.toml: no edition set: defaulting to the 2015 edition while the latest is 2021 Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 12 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded crc32fast v1.4.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.2.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded adler2 v2.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling adler2 v2.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crc32fast v1.4.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling miniz_oxide v0.8.3 (/src/miniz_oxide/miniz_oxide) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling miniz_oxide_c_api v0.3.1 (/src/miniz_oxide) Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: miniz/miniz.c:3089:9: warning: Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files. [-W#pragma-messages] Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: 3089 | #pragma message("Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files.") Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: | ^ Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: 1 warning generated. Step #3 - "compile-libfuzzer-address-x86_64":  Compiling miniz_oxide_c_api-fuzz v0.0.1 (/src/miniz_oxide/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:7:1 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | extern crate libc; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:9:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | use libc::*; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:25:40 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 |  let uncompressed_size = s.len() as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:29:50 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 |  let mut rust_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:29:35 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 |  let mut rust_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:31:52 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 |  let mut rust_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:31:37 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 |  let mut rust_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:34:47 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  let mut c_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:34:32 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  let mut c_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:36:49 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  let mut c_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:36:34 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  let mut c_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:13:41 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  dest_len: *mut c_ulong, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:15:38 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 |  source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:15:50 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 |  source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:17:43 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | ... dest_len: *mut c_ulong, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:19:40 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | ... source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:19:52 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | ... source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": For more information about this error, try `rustc --explain E0658`. Step #3 - "compile-libfuzzer-address-x86_64": error: could not compile `miniz_oxide_c_api-fuzz` (bin "fuzz_high") due to 17 previous errors Step #3 - "compile-libfuzzer-address-x86_64": warning: build failed, waiting for other jobs to finish... Step #3 - "compile-libfuzzer-address-x86_64": Error: failed to build fuzz script: ASAN_OPTIONS="detect_odr_violation=0" RUSTFLAGS="-Cpasses=sancov-module -Cllvm-args=-sanitizer-coverage-level=4 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters -Cllvm-args=-sanitizer-coverage-pc-table -Cllvm-args=-sanitizer-coverage-trace-compares --cfg fuzzing -Clink-dead-code -Zsanitizer=address -Cllvm-args=-sanitizer-coverage-stack-depth -C codegen-units=1 --cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers -L./bin/" "cargo" "build" "--manifest-path" "/src/miniz_oxide/fuzz/Cargo.toml" "--target" "x86_64-unknown-linux-gnu" "--release" "--config" "profile.release.debug=true" "--bins" Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-address-x86_64": Failed to build. Step #3 - "compile-libfuzzer-address-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_image miniz_oxide Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 miniz_oxide Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-address-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1